بدائل البحث:
based optimization » whale optimization (توسيع البحث)
process detection » process reflection (توسيع البحث), protein detection (توسيع البحث), stress detection (توسيع البحث)
data process » data processing (توسيع البحث), damage process (توسيع البحث), data access (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
binary mask » binary image (توسيع البحث)
mask based » task based (توسيع البحث), tasks based (توسيع البحث), risk based (توسيع البحث)
based optimization » whale optimization (توسيع البحث)
process detection » process reflection (توسيع البحث), protein detection (توسيع البحث), stress detection (توسيع البحث)
data process » data processing (توسيع البحث), damage process (توسيع البحث), data access (توسيع البحث)
binary data » primary data (توسيع البحث), dietary data (توسيع البحث)
binary mask » binary image (توسيع البحث)
mask based » task based (توسيع البحث), tasks based (توسيع البحث), risk based (توسيع البحث)
-
21
The architecture of the BI-LSTM model.
منشور في 2024"…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
-
22
Comparison of accuracy and DR on UNSW-NB15.
منشور في 2024"…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
-
23
Comparison of DR and FPR of UNSW-NB15.
منشور في 2024"…<div><p>Due to the recent advances in the Internet and communication technologies, network systems and data have evolved rapidly. The emergence of new attacks jeopardizes network security and make it really challenging to detect intrusions. …"
-
24
Flowchart scheme of the ML-based model.
منشور في 2024"…<b>I)</b> Testing data consisting of 20% of the entire dataset. <b>J)</b> Optimization of hyperparameter tuning. <b>K)</b> Algorithm selection from all models. …"
-
25
-
26
PathOlOgics_RBCs Python Scripts.zip
منشور في 2023"…This process generated a ground-truth binary semantic segmentation mask and determined the bounding box coordinates (XYWH) for each cell. …"
-
27
-
28
-
29
-
30
-
31
-
32
-
33
Steps in the extraction of 14 coordinates from the CT slices for the curved MPR.
منشور في 2025"…Protruding paths are then eliminated using graph-based optimization algorithms, as demonstrated in f). …"
-
34
-
35
Raw LC-MS/MS and RNA-Seq Mitochondria data
منشور في 2025"…The missing values were imputed with the minimum intensity value for each specific data set; (b) for samples expressed in both scLRP1+/+ and scLRP1-/- tissue, the filtering process required 2 or more proteins to be detected in both scLRP1+/+ and scLRP1-/- samples. …"
-
36
-
37
Table_1_Identification of sources of DIF using covariates in patient-reported outcome measures: a simulation study comparing two approaches based on Rasch family models.DOCX
منشور في 2023"…For both algorithms, the rate of false detection of DIF was close to 5%. …"
-
38
Table 1_Non-obtrusive monitoring of obstructive sleep apnea syndrome based on ballistocardiography: a preliminary study.docx
منشور في 2025"…Applying fast change-point detection to first isolate apnea-suspected episodes would allow for processing only those suspected episodes for further feature extraction and OSAS severity classification. …"
-
39
Data_Sheet_1_Alzheimer’s Disease Diagnosis and Biomarker Analysis Using Resting-State Functional MRI Functional Brain Network With Multi-Measures Features and Hippocampal Subfield...
منشور في 2022"…Finally, we implemented and compared the different feature selection algorithms to integrate the structural features, brain networks, and voxel features to optimize the diagnostic identifications of AD using support vector machine (SVM) classifiers. …"